Uncategorized

Kernel DMA Protection Hardening to Secure Your Systems

Reading time: 4 Minutes Read
Roy Ludmir
Published on: November 26, 2024
Kernel DMA Protection Hardening to Secure Your Systems

Kernel DMA Protection

Kernel Direct Memory Access (DMA) Protection is a security feature in Windows designed to prevent unauthorized access to memory by external peripherals.

Kernel DMA Protection requires UEFI firmware support, and Virtualization-based Security (VBS) isn’t required.

How to Plan and Manage a Hardening Project

Download the guide

Kernel DMA protection on or off?

Kernel DMA Protection offers enhanced security measures for the system compared to the countermeasures against BitLocker DMA attacks, all while preserving the usability of external peripherals.

Disabling Kernel DMA Protection may be required for certain hardware that needs unrestricted access. However, it’s essential to understand the security risks involved before making this change.

To Disable Kernel DMA Protection 

To disable Kernel DMA Protection, follow these steps:

Via Windows Settings

  1. Press Windows + I to open Settings.
  2. Navigate to Privacy & Security > Windows Security > Open Windows Security.
  3. Go to Device Security > Core Isolation Details.
  4. Under Memory Access Protection, toggle the switch to Off. Enter your administrator credentials if prompted.
  5. Restart your system for the changes to apply.

Via BIOS (if the above method doesn’t work):

  1. Restart your PC and press the appropriate key (varies by manufacturer, e.g., F2, F10, or DEL) to access the BIOS setup.
  2. In the BIOS menu, go to the Security tab.
  3. Locate Kernel DMA Protection and set it to Disabled.
  4. Save changes and exit the BIOS.

Refer to your PC manufacturer’s manual for specific instructions, as BIOS layouts differ across devices.

Via GPO

To establish the recommended configuration via GP, set the following UI path to Enabled: Block All:

Computer ConfigurationPoliciesAdministrative TemplatesSystemKernel DMA
ProtectionEnumeration policy for external devices incompatible with Kernel
DMA Protection

Note: This Group Policy path may not exist by default. It is provided by the Group Policy template DmaGuard.admx/adml that is included with the Microsoft Windows 10 Release 1809 & Server 2019 Administrative Templates (or newer).

Enumeration policy for external devices incompatible with Kernel DMA Protection

This policy aims to enhance security measures against external DMA-capable devices by offering increased control over the enumeration of such devices that may not support DMA Remapping or device memory isolation and sandboxing.

Note: This policy does not apply to 1394, PCMCIA or ExpressCard devices. The protection also only applies to Windows 10 R1803 or higher, and also requires a UEFI BIOS to function.

Note #2: More information on this feature is available at this link: Kernel DMA Protection for Thunderbolt™ 3 (Windows 10) | Microsoft Docs.

DMA Attacks and Kernel DMA Protection

DMA attacks exploit hardware functionality to bypass CPU controls and access system memory directly, potentially compromising sensitive data or taking control of the system.

How DMA Attacks Work

DMA allows devices to access memory without CPU involvement. Windows uses the IOMMU to block unauthorized peripherals unless their drivers support memory isolation (e.g., DMA-remapping). Kernel DMA Protection mitigates drive-by DMA attacks post-OS initialization, while firmware/BIOS must secure against attacks during boot via ports like Thunderbolt 3.

Examples of DMA Attacks

  1. FireWire (IEEE 1394): Attackers use malicious FireWire devices to access system memory directly.
  2. Thunderbolt: Exploits Thunderbolt’s DMA capabilities to access memory and compromise the system.
  3. GPU DMA: Vulnerable GPU drivers or firmware may allow attackers to misuse GPUs for unauthorized memory access.

Understanding these risks is essential for implementing proper safeguards.

Enable Kernel DMA Protection

Systems compatible with Kernel DMA Protection will activate the feature automatically, without any need for user or IT admin configuration.

You can verify whether Kernel DMA Protection is enabled using the Windows Security settings.

  1. Open Windows Security.
  2. Select Device security > Core isolation details > Memory access protection
memory access protection

(reference: Microsoft, Kernel DMA Protection)

Alternatively, you can use the System Information desktop app (msinfo32.exe). If the system supports Kernel DMA Protection, the Kernel DMA Protection value will be set to ON.

Kernel DMA Protection on

(reference: Microsoft, Kernel DMA Protection)

If the current state of Kernel DMA Protection is OFF and Hyper-V – Virtualization Enabled in Firmware is NO:

  • Reboot into UEFI settings
  • Turn on Intel Virtualization Technology
  • Turn on Intel Virtualization Technology for I/O (VT-d)
  • Reboot system into Windows

Hardening Kernel DMA Protection

Hardening Kernel DMA Protection refers to the process of enhancing the security of a system’s Direct Memory Access (DMA) by implementing measures to prevent unauthorized access to the system’s memory.

Automating the hardening process offers several advantages, making it the preferred approach for enhancing system security:

  • Manual configuration is prone to human error, which can leave systems vulnerable if proper settings are not applied consistently across the infrastructure.
  • Automation ensures that hardening measures like enabling IOMMU, disabling unnecessary DMA-capable interfaces, and applying least privilege mappings are implemented uniformly and reliably.
  • Automated processes can be triggered during system provisioning, updates, or on a recurring schedule to maintain the desired security posture.
  • Automation also simplifies the management and auditing of DMA protection policies, making it easier to validate compliance across a large number of systems.

Remember, hardening Kernel DMA Protection isn’t just an option, it’s an essential step in securing your digital domain. So, take charge and build a stronger, more resilient system today.

See How a Major Credit Union Achieved CIS Benchmark Compliance

Find out how
Roy Ludmir
Roy Ludmir is a cybersecurity entrepreneur and CEO with over 15 years of experience driving product innovation and sales growth in the security industry. He is highly skilled in CIS Benchmarks, baseline hardening, and vulnerability management, helping organizations strengthen defenses and meet compliance requirements. With a unique blend of executive leadership and deep technical expertise, he bridges business strategy with practical security solutions.

Related Articles

About Us

Established in 2001, CalCom is the leading provider of server hardening solutions that help organizations address the rapidly changing security landscape, threats, and regulations. CalCom Hardening Suite (CHS) is a security baseline hardening solution that eliminates outages, reduces operational costs, and ensures a resilient, constantly hardened, and monitored server environment.

More about us
Background Shape
About Us

Stay Ahead with Our Newsletter

Get the latest insights, security tips, and exclusive resources straight to your inbox every month.

    Ready to simplify compliance?

    See automated compliance in action—book your demo today!